On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
- 13 May 2003
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Universally composable two-party and multi-party secure computationPublished by Association for Computing Machinery (ACM) ,2002
- Universally Composable Notions of Key Exchange and Secure ChannelsPublished by Springer Nature ,2002
- Universally Composable CommitmentsPublished by Springer Nature ,2001
- Analysis of Key-Exchange Protocols and Their Use for Building Secure ChannelsPublished by Springer Nature ,2001
- The All-or-Nothing Nature of Two-Party Secure ComputationPublished by Springer Nature ,1999
- Adaptively secure multi-party computationPublished by Association for Computing Machinery (ACM) ,1996
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- A zero-one law for Boolean privacyPublished by Association for Computing Machinery (ACM) ,1989
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- Limits on the security of coin flips when half the processors are faultyPublished by Association for Computing Machinery (ACM) ,1986